http://arxiv.org/api/O5YlfWZDQ/RNSq5AieftYB+gkUM2025-04-22T00:00:00-04:00708904515http://arxiv.org/abs/2504.14370v12025-04-19T18:08:18Z2025-04-19T18:08:18ZDensity Measures for Language Generation The recent successes of large language models (LLMs) have led to a surge of
theoretical research into language generation. A recent line of work proposes
an abstract view, called language generation in the limit, where generation is
seen as a game between an adversary and an algorithm: the adversary generates
strings from an unknown language $K$, chosen from a countable collection of
candidate languages, and after seeing a finite set of these strings, the
algorithm must generate new strings from $K$ that it has not seen before. This
formalism highlights a key tension: the trade-off between validity (the
algorithm should only produce strings from the language) and breadth (it should
be able to produce many strings from the language). This trade-off is central
in applied language generation as well, where it appears as a balance between
hallucination (generating invalid utterances) and mode collapse (generating
only a restricted set of outputs). Despite its importance, this trade-off has
been challenging to study quantitatively. We develop ways to quantify this
trade-off by formalizing breadth using measures of density. Existing algorithms
for language generation in the limit produce output sets that can have zero
density in the true language, and this important failure of breadth might seem
unavoidable. We show, however, that such a failure is not necessary: we provide
an algorithm for language generation in the limit whose outputs have strictly
positive density in $K$. We also study the internal representations built by
these algorithms, specifically the sequence of hypothesized candidate languages
they consider, and show that achieving the strongest form of breadth may
require oscillating indefinitely between high- and low-density representations.
Our analysis introduces a novel topology on language families, with notions of
convergence and limit points playing a key role.
Jon KleinbergFan Weihttp://arxiv.org/abs/2504.14353v12025-04-19T16:43:41Z2025-04-19T16:43:41ZGoldbach Conjecture: Violation Probability and Generalization to
Prime-like Distributions Due to the distribution of primes among integers, we establish an upper bound
for the probability $\mathbb{P}_n$ that the Goldbach conjecture fails. Assuming
the conjecture holds true for all even number less than $2N$, we prove this
probability is less than $e^{-N^\alpha}$, where $ \alpha = 1 - \frac{2\ln\ln
N}{\ln N}$.
For large $N$, this probability becomes vanishingly small, effectively
precluding the existence of counterexamples in practice. If $N =4 \times
10^{18}$, the probability of a counterexample is less than $e^{-10^{15}}$. Our
approach fundamentally depends on the distributional properties of primes
rather than their primality per se. This perspective enables a natural
generalization of the conjecture to non-prime subsets of integers that exhibit
similar distributional characteristics. As a concrete example, we construct new
subsets by applying random $\pm 1$ shifts to primes, which preserve the
essential prime-like distributional properties. Computational verification
confirms that this generalized Goldbach conjecture holds for all even integers
up to $2 \times 10^{8}$ within these modified subsets.
Ameneh Farhadianhttp://arxiv.org/abs/2504.14352v12025-04-19T16:42:11Z2025-04-19T16:42:11ZConnectivity versus Lin-Lu-Yau curvature We explore the interaction between connectivity and Lin-Lu-Yau curvature of
graphs systematically. The intuition is that connected graphs with large
Lin-Lu-Yau curvature also have large connectivity, and vice versa. We prove
that the connectivity of a connected graph is lower bounded by the product of
its minimum degree and its Lin-Lu-Yau curvature. On the other hand, if the
connectivity of a graph $G$ on $n$ vertices is at least $\frac{n-1}{2}$, then
$G$ has positive Lin-Lu-Yau curvature. Moreover, the bound $\frac{n-1}{2}$ here
is optimal. Furthermore, we prove that the edge-connectivity is equal to the
minimum vertex degree for any connected graph with positive Lin-Lu-Yau
curvature. As applications, we estimate or determine the connectivity and
edge-connectivity of an amply regular graph with parameters $(d,\alpha,\beta)$
such that $1\neq \beta\geq \alpha$.
Kaizhe ChenShiping LiuZhe You22 pageshttp://arxiv.org/abs/2504.14344v12025-04-19T16:24:29Z2025-04-19T16:24:29ZOn the action of the cactus group on the set of Gelfand-Tsetlin patterns
for orthogonal Lie algebras The purpose of this work is to define a natural action of the cactus group on
the set of Gelfand-Tsetlin patterns for orthogonal Lie algebras. These
Gelfand-Tsetlin patterns are meant to index the Gelfand-Tsetlin basis in the
irreducible representations of the orthogonal Lie algebra $\mathfrak{o}_N$ with
respect to the chain of nested orthogonal Lie algebras $\mathfrak{o}_N \supset
\mathfrak{o}_{N-1} \supset \ldots \supset \mathfrak{o}_3$. Using the Howe
duality between $O_N$ and $\mathfrak{o}_{2n}$, we realize some representations
of $\mathfrak{o}_N$ as multiplicity spaces inside the tensor power of the
spinor representation $(\Lambda \mathbb{C}^{n})^{\otimes N}$. There is a
natural choice of the basis inside the multiplicity space, which agrees with
the decomposition of $(\Lambda \mathbb{C}^{n})^{\otimes N}$ into simple
$\mathfrak{o}_{2n}$-modules. We call such basis principal. The action of the
cactus group $C_N$ by the crystal commutors on the crystal arising from
$(\Lambda \mathbb{C}^{n})^{\otimes N}$ induces the action of $C_N$ on the set
indexing the principal basis inside the multiplicity space. We call this set
regular cell tables. Regular cell tables are the analog of semi-standard Young
tables. There is a natural bijection between a specific subset of semi-standard
Young tables and regular cell tables. In this paper, we establish a natural
bijection between the principal basis and the Gelfand-Tsetlin basis and,
therefore, define an action of the cactus group on the set Gelfand-Tsetlin
patterns.
Igor Svyatnyyhttp://arxiv.org/abs/2502.12844v22025-04-19T15:34:22Z2025-02-18T13:24:09ZGeneralized De Bruijn Words, Invertible Necklaces, and the
Burrows-Wheeler Transform We define generalized de Bruijn words as those words having a Burrows-Wheeler
transform that is a concatenation of permutations of the alphabet. We show that
generalized de Bruijn words are in 1-to-1 correspondence with Hamiltonian
cycles in the generalized de Bruijn graphs introduced in the early '80s in the
context of network design. When the size of the alphabet is a prime $p$, we
define invertible necklaces as those whose BWT-matrix is non-singular. We show
that invertible necklaces of length $n$ correspond to normal bases of the
finite field $F_{p^n}$, and that they form an Abelian group isomorphic to the
Reutenauer group $RG_p^n$. Using known results in abstract algebra, we can make
a bridge between generalized de Bruijn words and invertible necklaces. In
particular, we highlight a correspondence between binary de Bruijn words of
order $d+1$, binary necklaces of length $2^{d}$ having an odd number of $1$'s,
invertible BWT matrices of size $2^{d}\times 2^{d}$, and normal bases of the
finite field $F_{2^{2^{d}}}$.
Gabriele FiciEstéban GaborySubmittedhttp://arxiv.org/abs/2203.14422v22025-04-19T12:29:59Z2022-03-28T00:16:20ZPrincipal Specialization of Monomial Symmetric Polynomials and Group
Determinants of Cyclic Groups In this paper, we consider the principal specialization of monomial symmetric
polynomials and investigate the special values of these polynomials at the
point $$ \zeta_{(n,k)} := ( 1, \zeta_n, \zeta_n^2, \dots, \zeta_n^{kn-1} ), $$
where \(\zeta_n\) is a primitive \(n\)th root of unity. We give explicit
formulas for several special values. Also, we show that these special values
naturally appear as the coefficients in the expansion of the $k$th power of the
circulant determinant of order $n$ (the group determinant of the cyclic group
of order $n$). These results extend Ore's results for $k = 1$. Furthermore, we
determine the number of terms in the $k$th power of the group permanent of the
cyclic group of order $n$. This extends Brualdi and Newman's result for $k =
1$.
Naoya YamaguchiYuka YamaguchiGenki Shibukawahttp://arxiv.org/abs/2504.14270v12025-04-19T11:46:37Z2025-04-19T11:46:37ZConvergence Laws for Extensions of First-Order Logic with Averaging For many standard models of random structure, first-order logic sentences
exhibit a convergence phenomenon on random inputs. The most well-known example
is for random graphs with constant edge probability, where the probabilities of
first-order sentences converge to 0 or 1. In other cases, such as certain
``sparse random graph'' models, the probabilities of sentences converge,
although not necessarily to 0 or 1. In this work we deal with extensions of
first-order logic with aggregate operators, variations of averaging. These
logics will consist of real-valued terms, and we allow arbitrary Lipschitz
functions to be used as ``connectives''. We show that some of the well-known
convergence laws extend to this setting.
Sam Adam-DayMichael BenediktAlberto Larraurihttp://arxiv.org/abs/2504.14265v12025-04-19T11:21:29Z2025-04-19T11:21:29ZA Covering Pursuit Game In the `Covering' pursuit game on a graph, a robber and a set of cops play
alternately, with the cops each moving to an adjacent vertex (or not moving)
and the robber moving to a vertex at distance at most 2 from his current
vertex. The aim of the cops is to ensure that, after every one of their turns,
there is a cop at the same vertex as the robber. How few cops are needed?
Our main aim in this paper is to consider this problem for the
two-dimensional grid $[n]^2$. Bollob\'{a}s and Leader asked if the number of
cops needed is $o(n^2)$. We answer this question by showing that $n^{1.999}$
cops suffice. We also consider some applications. In particular we study the
game `Catching a Fast Robber', concerning the number of cops needed to catch a
fast robber of speed $s$ on the two-dimensional grid $[n]^2$. We improve the
bounds proved by Balister, Bollob\'{a}s, Narayanan and Shaw for this game.
Benjamin Gillott18 pageshttp://arxiv.org/abs/2504.14256v12025-04-19T10:20:40Z2025-04-19T10:20:40ZMaker-Maker games of rank 4 are PSPACE-complete The Maker-Maker convention of positional games is played on a hypergraph
whose edges are interpreted as winning sets. Two players take turns picking a
previously unpicked vertex, aiming at being first to pick all the vertices of
some edge. Optimal play can only lead to a first player win or a draw, and
deciding between the two is known to be PSPACE-complete even for 6-uniform
hypergraphs. We establish PSPACE-completeness for hypergraphs of rank 4. As an
intermediary, we use the recently introduced achievement positional games, a
more general convention in which each player has their own winning sets (blue
and red). We show that deciding whether the blue player has a winning strategy
as the first player is PSPACE-complete even with blue edges of size 2 or 3 and
pairwise disjoint red edges of size 2. The result for hypergraphs of rank 4 in
the Maker-Maker convention follows as a simple corollary.
Florian GalliotJonas Sénizergueshttp://arxiv.org/abs/2501.09842v22025-04-19T09:59:08Z2025-01-16T21:08:35ZThe semi-inducibility problem Let $H$ be a $k$-edge-coloured graph and let $n$ be a positive integer. What
is the maximum number of copies of $H$ in a $k$-edge-coloured complete graph on
$n$ vertices? This paper studies the case $k=2$, which we call the
semi-inducibility problem. This problem is a generalisation of the inducibility
problem of Pippenger and Golumbic which is solved only for some small graphs
and limited families of graphs. We prove sharp or almost sharp results for
alternating walks, for alternating cycles of length divisible by 4, and for
4-cycles of every colour pattern.
Liu, Mubayi and Reiher asked whether there is a graph $F$ for which the
binomial random graph is an asymptotically extremal graph in the inducibility
problem over all graphs of a given edge density. This was recently answered in
a strong negative sense by Jain, Michelen and Wei. In contrast, we find a
\emph{quantum} graph $Q$ with positive coefficients and an interval of edge
densities for which the only extremal graphs are quasirandom.
Abdul BasitBertille GranetDaniel HorsleyAndré KündgenKatherine Staden45 pages including references; added references to related resultshttp://arxiv.org/abs/2504.11483v22025-04-19T04:45:32Z2025-04-13T23:13:49ZA note on the mean square of the Riemann zeta-function In this paper, we will give a new proof for a known result of the mean square
of Riemann zeta-function.
An-Ping Lia revisionhttp://arxiv.org/abs/2504.14134v12025-04-19T01:49:43Z2025-04-19T01:49:43ZThere are finitely many $5$-vertex-critical $(P_6,\text{bull})$-free
graphs In this paper, we are interested in $4$-colouring algorithms for graphs that
do not contain an induced path on $6$ vertices nor an induced bull, i.e., the
graph with vertex set $\{v_1,v_2,v_3,v_4,v_5\}$ and edge set
$\{v_1v_2,v_2v_3,v_3v_4,v_2v_5,v_3v_5\}$. Such graphs are referred to as
$(P_6,\text{bull})$-free graphs. A graph $G$ is \emph{$k$-vertex-critical} if
$\chi(G)=k$, and every proper induced subgraph $H$ of $G$ has $\chi(H)<k$. In
the current paper, we investigate the structure of $5$-vertex-critical
$(P_6,\text{bull})$-free graphs and show that there are only finitely many such
graphs, thereby answering a question of Maffray and Pastor. A direct corollary
of this is that there exists a polynomial-time algorithm to decide if a
$(P_6,\text{bull})$-free graph is $4$-colourable such that this algorithm can
also provide a certificate that can be verified in polynomial time and serves
as a proof of 4-colourability or non-4-colourability.
Yiao JuJorik JookenJan GoedgebeurShenwei Huanghttp://arxiv.org/abs/2504.14124v12025-04-19T00:49:49Z2025-04-19T00:49:49ZProgress on Self Identifying Codes The concept of an identifying code for a graph was introduced by Karpovsky,
Chakrabarty, and Levitin in 1998 as the problem of covering the vertices of a
graph such that we can uniquely identify any vertex in the graph by examining
the vertices that cover it. An application of an identifying code would be to
detect a faulty processor in a multiprocessor system. In 2020, a variation of
identify code called "self-identifying code" was introduced by Junnila and
Laihonen, which simplifies the task of locating the malfunctioning processor.
In this paper, we continue to explore self-identifying codes. In particular, we
prove the problem of determining the minimum cardinality of a self-identifying
code for an arbitrary graph is NP-complete and we investigate minimum-sized
self-identifying code in several classes of graphs, including cubic graphs and
infinite grids.
Devin JeanSuk Seohttp://arxiv.org/abs/2312.01715v22025-04-18T22:23:55Z2023-12-04T08:14:23ZInterlacing Polynomial Method for Matrix Approximation via Generalized
Column and Row Selection This paper delves into the spectral norm aspect of the Generalized Column and
Row Subset Selection (GCRSS) problem. Given a target matrix $\mathbf{A}\in
\mathbb{R}^{n\times d}$, the objective of GCRSS is to select a column submatrix
$\mathbf{B}_{:,S}\in\mathbb{R}^{n\times k}$ from the source matrix
$\mathbf{B}\in\mathbb{R}^{n\times d_B}$ and a row submatrix
$\mathbf{C}_{R,:}\in\mathbb{R}^{r\times d}$ from the source matrix
$\mathbf{C}\in\mathbb{R}^{n_C\times d}$, such that the residual matrix
$(\mathbf{I}_n-\mathbf{B}_{:,S}\mathbf{B}_{:,S}^{\dagger})\mathbf{A}(\mathbf{I}_d-\mathbf{C}_{R,:}^{\dagger}
\mathbf{C}_{R,:})$ has a small spectral norm. By employing the method of
interlacing polynomials, we show that the smallest possible spectral norm of a
residual matrix can be bounded by the largest root of a related expected
characteristic polynomial. A deterministic polynomial time algorithm is
provided for the spectral norm case of the GCRSS problem. We next focus on two
specific GCRSS scenarios: the Generalized Column Subset Selection (GCSS)
problem ($r=0$), and the submatrix selection problem
($\mathbf{B}=\mathbf{C}=\mathbf{I}_d$). In the GCSS scenario, we connect the
expected characteristic polynomials to the convolution of multi-affine
polynomials, leading to the derivation of the first provable reconstruction
bound on the spectral norm of a residual matrix. In the submatrix selection
scenario, we show that for any sufficiently small $\varepsilon>0$ and any
square matrix $\mathbf{A}\in\mathbb{R}^{d\times d}$, there exist two subsets
$S\subset [d]$ and $R\subset [d]$ of sizes $O(d\cdot \varepsilon^2)$ such that
$\Vert\mathbf{A}_{S,R}\Vert_2\leq \varepsilon\cdot \Vert\mathbf{A}\Vert_2$.
Jian-Feng CaiZhiqiang XuZili XuAccepted by Foundations of Computational Mathematicshttp://arxiv.org/abs/2504.14080v12025-04-18T21:12:59Z2025-04-18T21:12:59ZOn minimal shapes and topological invariants in hyperbolic lattices We characterize the set of finite shapes with minimal perimeter on hyperbolic
lattices given by regular tilings of the hyperbolic plane whose tiles are
regular $p$-gons meeting at vertices of degree $q$, with $1/p+1/q<\frac{1}{2}$.
The main tool is a layer decomposition due to Rietman--Nienhuis--Oitmaa and
Moran, which allows us to prove convergence towards the Cheeger constant when
these shapes exhaust the lattice. Furthermore, we apply a celebrated result of
Floyd--Plotnick, which will allow us to compute the Euler characteristic for
these graphs in terms of certain growth functions and the number of $n$-sized
animals on those lattices.
Matteo D'AchilleVanessa JacquierWioletta M. Ruszel22 pages, 19 figures